US20100217947A1 - Discontiguous object addressing - Google Patents

Discontiguous object addressing Download PDF

Info

Publication number
US20100217947A1
US20100217947A1 US12/393,993 US39399309A US2010217947A1 US 20100217947 A1 US20100217947 A1 US 20100217947A1 US 39399309 A US39399309 A US 39399309A US 2010217947 A1 US2010217947 A1 US 2010217947A1
Authority
US
United States
Prior art keywords
properties
processor
property
access
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/393,993
Other versions
US8489840B2 (en
Inventor
James P. Schneider
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Red Hat Inc
Original Assignee
Red Hat Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Red Hat Inc filed Critical Red Hat Inc
Priority to US12/393,993 priority Critical patent/US8489840B2/en
Assigned to RED HAT, INC. reassignment RED HAT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SCHNEIDER, JAMES P.
Publication of US20100217947A1 publication Critical patent/US20100217947A1/en
Application granted granted Critical
Publication of US8489840B2 publication Critical patent/US8489840B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/023Free address space management
    • G06F12/0253Garbage collection, i.e. reclamation of unreferenced memory

Definitions

  • Embodiments of the present invention relate to computer systems, and more specifically to discontiguous object addressing in a computer system.
  • objects in a computer system are logical entities stored in a memory, such as a cache memory, a hard drive, etc.
  • a memory such as a cache memory, a hard drive, etc.
  • each object has multiple properties. Nevertheless, the object is handled as a single unit, and is stored as a single unit in one or more contiguous chunks of memory. Because the properties of an object may span across a wide spectrum of information, not every property of the same object may be used as often as the other properties.
  • an exemplary conventional object is a data structure representing a bank account.
  • the exemplary object may include the following properties: account number, account holder name(s), type of account (e.g., checking, saving, etc.), transaction history of the account, opening date of the account, etc.
  • the opening date of the account is typically used less often than the account number of the account. In fact, according to one prior study, only approximately 20% of the properties of an object are involved in approximately 80% of the references to that object.
  • FIG. 1A illustrates a flow diagram of one embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • FIG. 1B illustrates a flow diagram of an alternate embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • FIG. 2 illustrates a block diagram of one embodiment of a computer system.
  • FIG. 3 illustrates a call diagram of one embodiment of an implementation of discontiguous object addressing.
  • FIG. 4 illustrates a block diagram of an exemplary computer system.
  • a set of objects, each having one or more properties are stored in a memory, which is divided into chunks. Specifically, the properties of at least one of the objects are stored in discontiguous chunks of the memory.
  • a processor in the computer system may access the individual properties in the discontiguous chunks of memory independently. To further improve efficiency, the processor may track access data of the properties and may use the access data to manage the properties. More details of some embodiments of discontiguous object addressing are described below.
  • the present invention also relates to apparatus for performing the operations herein.
  • This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a machine-readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • FIG. 1A illustrates a flow diagram of one embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • the method may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • processing logic may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • processing logic may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • the computer system 200 illustrated in FIG. 2 in some embodiments.
  • processing logic maintains a property access count for each property of each object in a computer system separately in a memory of the computer system (processing block 100 ).
  • An object as used herein broadly refers to a conceptual entity or a logical entity with a set of one or more properties.
  • An object may contain data, which may include strings of characters, numbers, pointers to code, etc.
  • the memory of the computer system may be a cache memory, a hard drive, etc.
  • processing logic stores the properties of each object and their respective property access counts in one or more discontiguous chunks of the memory based on their respective property access counts (processing block 103 ).
  • properties with higher property access counts may be stored in a chunk of memory that allows faster access because these properties are more likely to be accessed, while properties with lower property access counts may be stored in a chunk of memory that requires longer access time because these properties are less likely to be accessed.
  • properties of different objects that have high access counts may be stored in the same cacheline in a cache memory to shorten access time.
  • processing logic allows the properties of each object to be accessed independently (processing block 105 ). In other words, a property of an object may be retrieved, read, or modified without retrieving, reading, or modifying other properties of the object.
  • an access flag may be set once a property is accessed.
  • the access flag may be reset upon garbage collection and locality optimization. This approach greatly simplifies tracking of access data of the properties. However, one should appreciate that the access data collected using the access flags provides less information than the property access counts, and thus, less optimization of the storage of the properties may be possible under this simplified approach.
  • FIG. 1B illustrates a flow diagram of an alternate embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • the method may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • processing logic may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • processing logic may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof.
  • the computer system 200 illustrated in FIG. 2 in some embodiments.
  • processing logic manage each object in a computer system as a single unit (processing block 110 ).
  • each object has a set of one or more properties.
  • Processing logic maintains an access count for each object (processing block 115 ). For instance, each object is associated with its own access counter, and processing logic increments the access counter when the object is read. Processing logic increments the access counter again later when the object is modified. As such, the count in each access counter represents the number of times the corresponding object has been accessed.
  • processing logic checks if the access count of the object has exceeded a predetermined threshold (processing block 120 ).
  • the predetermined threshold may be a fixed value. Alternatively, the predetermined threshold may be an adjustable parameter. If the access count of the object has exceeded the predetermined threshold, then processing logic transitions to processing block 130 . Otherwise, processing logic returns to processing block 115 to continue keeping track of the number of times the object has been accessed.
  • processing logic may classify the object as a frequently accessed object in the computer system. Thus, to improve efficiency and to reduce access time, processing logic manages each property in the set of one or more properties of the object independently (processing block 130 ). Furthermore, processing logic maintains individual property access counts of the properties of the object (processing block 135 ).
  • the object may be managed as a single unit or the properties of the object may be managed separately, depending on how often the object is accessed, this approach is also referred to as a hybrid mode.
  • this approach is also referred to as a hybrid mode.
  • processing logic may store the properties in discontiguous chunks of memory. For instance, some of the properties that are more frequently accessed than others may be stored in the same cacheline in a cache memory to shorten access time.
  • FIG. 1A is simpler than the hybrid mode illustrated in FIG. 1B because there is no need to determine if an object should be managed as a single unit or the properties of the object should be managed independently.
  • the approach illustrated in FIG. 1A may double or triple the amount of memory required to maintain the objects because of the extra access counts maintained for each property of each object.
  • FIG. 2 illustrates a block diagram of one embodiment of a computer system.
  • the computer system 200 may be implemented in various machines, such as a server, a personal computer, a personal digital assistant, a cellular telephone, etc.
  • the computer system 200 includes a processor 210 and a cache memory 220 .
  • the processor 210 may include one or more processing devices, single-core processors, multi-core processors, etc. Furthermore, the processor 210 is sometimes referred to as a central processing unit (CPU) in the computer system 200 .
  • the processor 210 and the cache memory 220 reside on the same integrated circuit (IC) substrate. Alternatively, the processor 210 and the cache memory 220 reside on different IC substrates, but are, nevertheless, incorporated into the same semiconductor package. In another alternate embodiment, the processor 210 and the cache memory 220 reside on different IC substrates and are packaged separately.
  • the processor 210 can access the cache memory 220 faster than other memory or storage devices in the computer system 200 because the cache memory 220 is designed for fast access. To shorten access time, properties of objects that have high access counts are placed in the cache memory 220 because these properties are generally likely to be accessed again by the processor 210 soon.
  • the cache memory 220 has a number of cachelines 221 .
  • the size of each of the cachelines 221 may vary in different embodiments (e.g., 8-byte, 16-byte, 512-byte, etc.).
  • Each of the cachelines 221 stores a number of properties, which may or may not be associated with the same object. For example, referring to FIG. 2 , in the first one of the cachelines 221 , there are property 223 A, property 223 B, and property 223 C, where properties 223 A and 223 B are associated with Object 1 , and property 223 C is associated with a different object, Object 2 .
  • Each property in the cache memory 220 is stored with its own access count in an access count field.
  • property access count fields 225 A- 225 C are associated with properties 223 A- 223 C, respectively.
  • the size of each property may vary, such as 2-byte, 4-byte, 8-byte, etc.
  • the number of bits in each property access count field may also vary in different embodiments.
  • the property access count fields 225 A- 225 C are 4-bit long.
  • the property access count fields 225 A- 225 C may be used by access counters for the properties 223 A- 223 C to store the corresponding access counts of the properties 223 A- 223 C. Each time the processor 210 accesses one of the properties 223 A- 223 C, the count in the corresponding property access count field is incremented.
  • the counts in the property access count fields 225 A- 225 C are reset to zero upon garbage collection and locality optimization. Therefore, the counts in the property access count fields 225 A- 225 C represent the number of times the respective properties 223 A- 223 C have been accessed by the processor 210 since the last garbage collection and locality optimization.
  • the properties 223 A- 223 C in the cache memory 220 can be re-arranged to be contiguous so that successive accesses to the properties 223 A- 223 C are less likely to cause contention for the same cacheline.
  • the most frequently accessed properties are identified and placed close to each other in the cache memory 220 . For instance, these properties may be arranged in the same cacheline or consecutive cachelines. Note that cachelines are generally only able to hold data from a small subset of the total addressable space.
  • a 16 M cache may only have 4 or 8 cachelines able to hold data residing at addresses that are evenly divisible by 1,048,576. If the frequently accessed properties are arranged in consecutive locations, it is much less likely that successive access to two different properties will cause contention that results in the earlier accessed property to be ejected from the cache. Also, since properties are typically small compared to cachelines, arranging frequently accessed properties into consecutive address locations normally packs multiple properties into a single cacheline, so that an access to a property that causes a cache miss is likely to cause other properties that will be accessed in the near future to be loaded into the cache at the same time.
  • any or all of the components of the computer system 200 and associated hardware may be used in various embodiments of the present invention. However, it can be appreciated that other configurations of the computer system 200 may include more or fewer components than those discussed above.
  • the processor 210 and the cache memory 220 are illustrative examples of components in the computer system 200 . One should appreciate that other types of components and/or devices may be included in the computer system 200 in other embodiments.
  • the processor 210 may be further coupled to an input/output controller, a memory controller, and additional memory or storage devices in the computer system 200 .
  • FIG. 3 illustrates a call diagram of one embodiment of an implementation of discontiguous object addressing in a computer system.
  • the computer system may be a server, a personal computer, a personal digital assistant, a cellular telephone, etc.
  • One exemplary computer system usable to implement some embodiments of the current invention is shown in details in FIG. 4 .
  • the computer system 300 includes a method 310 , a registration function 320 , a memory 330 , and a release function 340 .
  • a caller such as a user application
  • the method 310 may attempt to reference one or more properties of an object.
  • the method 310 calls the registration function 320 and sends a reference to the object 301 , an array of property selectors 303 , and a pointer to a result storage location 305 to the registration function 320 .
  • the array of property selectors 303 may be statically created at compile time, and the array that holds returned data may be allocated from the stack frame of the calling method 310 .
  • the registration function 320 supplies the parameters usable by the method 310 to safely access the properties of the object that the method 310 requests to reference. Then the registration function 320 sends the references for the properties requested 325 to the memory 330 to access the properties.
  • the memory 330 may include a cache memory, such as the cache memory 220 shown in FIG. 2 . Details of how properties may be arranged and stored in the memory based on the property access counts have been discussed above with reference to FIG. 2 .
  • the memory 330 After receiving the references for the properties requested 325 , the memory 330 returns the properties 335 requested to the calling method 310 .
  • the release function 340 may be called immediately before the method 310 returns to the caller, as indicated by the dashed arrows in FIG. 3 .
  • the registration function 320 populates a pointer to a property and a pointer to the corresponding property access counter for the property.
  • the registration function 320 populates pointers to the properties, and initializes associated property access counters to zero, where the release function 340 and a garbage collection mechanism work together to maintain property access counts for the properties themselves. Note that the first approach may simplify the garbage collection process, but it is probably slower because updates to the property access counters would have to be synchronized. Synchronization of the property access counters may entail unnecessary cache write-throughs and bus stalls in a symmetric multi-processing (SMP) environment.
  • SMP symmetric multi-processing
  • updates to the access counter would require incrementing an integer value, which is a single cycle operation, assuming no cache misses.
  • garbage collection or locality optimization thread begins, it would add and zero the values for each particular object it is managing. This may require synchronization, but some processors (such as many recent x86 microprocessors) provide atomic operations to make this simpler and faster.
  • the release function 340 may simply add the property access counts to the respective existing property access counts for the properties.
  • FIG. 4 illustrates a diagrammatic representation of a machine in the exemplary form of a computer system 400 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed.
  • the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, and/or the Internet.
  • the machine may operate in the capacity of a server or a client machine in client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
  • the machine may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • PC personal computer
  • PDA Personal Digital Assistant
  • STB set-top box
  • STB set-top box
  • a cellular telephone a web appliance
  • server a server
  • network router a network router
  • switch or bridge any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • machine shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
  • the exemplary computer system 400 includes a processing device 402 , a main memory 404 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 406 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 418 , which communicate with each other via a bus 432 .
  • main memory 404 e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.
  • DRAM dynamic random access memory
  • SDRAM synchronous DRAM
  • RDRAM Rambus DRAM
  • static memory 406 e.g., flash memory, static random access memory (SRAM), etc.
  • SRAM static random access memory
  • Processing device 402 represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device may be complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device 402 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device 402 is configured to execute the processing logic 426 for performing the operations and steps discussed herein.
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • DSP digital signal processor
  • the computer system 400 may further include a network interface device 408 .
  • the computer system 400 also may include a video display unit 410 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 412 (e.g., a keyboard), a cursor control device 414 (e.g., a mouse), and a signal generation device 416 (e.g., a speaker).
  • a video display unit 410 e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)
  • an alphanumeric input device 412 e.g., a keyboard
  • a cursor control device 414 e.g., a mouse
  • a signal generation device 416 e.g., a speaker
  • the data storage device 418 may include a computer-accessible storage medium 430 (also known as a computer-readable storage medium) on which is stored one or more sets of instructions (e.g., software 422 ) embodying any one or more of the methodologies or functions described herein.
  • the software 422 may also reside, completely or at least partially, within the main memory 404 and/or within the processing device 402 during execution thereof by the computer system 400 , the main memory 404 and the processing device 402 also constituting computer-accessible storage media.
  • the software 422 may further be transmitted or received over a network 420 via the network interface device 408 .
  • While the computer-readable storage medium 430 is shown in an exemplary embodiment to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
  • the term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention.
  • the term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Memory System Of A Hierarchy Structure (AREA)

Abstract

Some embodiments of discontiguous object addressing have been presented. In one embodiment, a set of objects, each having one or more properties, are stored in a memory of a computer system. The memory is divided into chunks. The properties of at least one of the objects are stored in discontiguous chunks of the memory. Furthermore, a processor in the computer system may independently access the individual properties in the discontiguous chunks of memory.

Description

    TECHNICAL FIELD
  • Embodiments of the present invention relate to computer systems, and more specifically to discontiguous object addressing in a computer system.
  • BACKGROUND
  • Conventionally, objects in a computer system are logical entities stored in a memory, such as a cache memory, a hard drive, etc. Typically, each object has multiple properties. Nevertheless, the object is handled as a single unit, and is stored as a single unit in one or more contiguous chunks of memory. Because the properties of an object may span across a wide spectrum of information, not every property of the same object may be used as often as the other properties.
  • For instance, an exemplary conventional object is a data structure representing a bank account. The exemplary object may include the following properties: account number, account holder name(s), type of account (e.g., checking, saving, etc.), transaction history of the account, opening date of the account, etc. In some conventional applications, the opening date of the account is typically used less often than the account number of the account. In fact, according to one prior study, only approximately 20% of the properties of an object are involved in approximately 80% of the references to that object.
  • However, even though not each property of the object is used as frequently as other properties, one or more continguous chunks of the memory are allocated to store the entire object because all properties of the object are managed as a single unit. This conventional approach is particularly wasteful for storing objects in the cache memory of the computer system because the capacity of the cache memory is generally more limited than other memories in the computer system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
  • FIG. 1A illustrates a flow diagram of one embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • FIG. 1B illustrates a flow diagram of an alternate embodiment of a method to manage objects with discontiguous addressing in a computer system.
  • FIG. 2 illustrates a block diagram of one embodiment of a computer system.
  • FIG. 3 illustrates a call diagram of one embodiment of an implementation of discontiguous object addressing.
  • FIG. 4 illustrates a block diagram of an exemplary computer system.
  • DETAILED DESCRIPTION
  • Described herein are some embodiments of discontiguous object addressing. In some embodiments, a set of objects, each having one or more properties, are stored in a memory, which is divided into chunks. Specifically, the properties of at least one of the objects are stored in discontiguous chunks of the memory. A processor in the computer system may access the individual properties in the discontiguous chunks of memory independently. To further improve efficiency, the processor may track access data of the properties and may use the access data to manage the properties. More details of some embodiments of discontiguous object addressing are described below.
  • In the following description, numerous details are set forth. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
  • Some portions of the detailed descriptions below are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
  • It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission, or display devices.
  • The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a machine-readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required operations. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
  • FIG. 1A illustrates a flow diagram of one embodiment of a method to manage objects with discontiguous addressing in a computer system. The method may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof. For instance, at least part of the method may be performed by the computer system 200 illustrated in FIG. 2 in some embodiments.
  • Initially, processing logic maintains a property access count for each property of each object in a computer system separately in a memory of the computer system (processing block 100). An object as used herein broadly refers to a conceptual entity or a logical entity with a set of one or more properties. An object may contain data, which may include strings of characters, numbers, pointers to code, etc. The memory of the computer system may be a cache memory, a hard drive, etc. Then processing logic stores the properties of each object and their respective property access counts in one or more discontiguous chunks of the memory based on their respective property access counts (processing block 103). For example, properties with higher property access counts may be stored in a chunk of memory that allows faster access because these properties are more likely to be accessed, while properties with lower property access counts may be stored in a chunk of memory that requires longer access time because these properties are less likely to be accessed. Alternatively, properties of different objects that have high access counts may be stored in the same cacheline in a cache memory to shorten access time. Furthermore, processing logic allows the properties of each object to be accessed independently (processing block 105). In other words, a property of an object may be retrieved, read, or modified without retrieving, reading, or modifying other properties of the object.
  • Alternatively, instead of maintaining the access count, an access flag may be set once a property is accessed. The access flag may be reset upon garbage collection and locality optimization. This approach greatly simplifies tracking of access data of the properties. However, one should appreciate that the access data collected using the access flags provides less information than the property access counts, and thus, less optimization of the storage of the properties may be possible under this simplified approach.
  • FIG. 1B illustrates a flow diagram of an alternate embodiment of a method to manage objects with discontiguous addressing in a computer system. The method may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), firmware, or a combination thereof. For instance, at least part of the method may be performed by the computer system 200 illustrated in FIG. 2 in some embodiments.
  • Initially, processing logic manage each object in a computer system as a single unit (processing block 110). As discussed above, each object has a set of one or more properties. Processing logic maintains an access count for each object (processing block 115). For instance, each object is associated with its own access counter, and processing logic increments the access counter when the object is read. Processing logic increments the access counter again later when the object is modified. As such, the count in each access counter represents the number of times the corresponding object has been accessed.
  • In some embodiments, processing logic checks if the access count of the object has exceeded a predetermined threshold (processing block 120). The predetermined threshold may be a fixed value. Alternatively, the predetermined threshold may be an adjustable parameter. If the access count of the object has exceeded the predetermined threshold, then processing logic transitions to processing block 130. Otherwise, processing logic returns to processing block 115 to continue keeping track of the number of times the object has been accessed.
  • If the access count of the object exceeds the predetermined threshold, then processing logic may classify the object as a frequently accessed object in the computer system. Thus, to improve efficiency and to reduce access time, processing logic manages each property in the set of one or more properties of the object independently (processing block 130). Furthermore, processing logic maintains individual property access counts of the properties of the object (processing block 135).
  • Because the object may be managed as a single unit or the properties of the object may be managed separately, depending on how often the object is accessed, this approach is also referred to as a hybrid mode. As previously discussed, even though an object is frequently accessed, it is not necessary for all properties of the object to be about equally frequently accessed. For example, some properties of the object may be accessed once initially and is not accessed again later in many applications. By managing the properties of the object independently, processing logic may store the properties in discontiguous chunks of memory. For instance, some of the properties that are more frequently accessed than others may be stored in the same cacheline in a cache memory to shorten access time.
  • Note that the approach illustrated in FIG. 1A is simpler than the hybrid mode illustrated in FIG. 1B because there is no need to determine if an object should be managed as a single unit or the properties of the object should be managed independently. However, the approach illustrated in FIG. 1A may double or triple the amount of memory required to maintain the objects because of the extra access counts maintained for each property of each object.
  • FIG. 2 illustrates a block diagram of one embodiment of a computer system. The computer system 200 may be implemented in various machines, such as a server, a personal computer, a personal digital assistant, a cellular telephone, etc.
  • In some embodiments, the computer system 200 includes a processor 210 and a cache memory 220. The processor 210 may include one or more processing devices, single-core processors, multi-core processors, etc. Furthermore, the processor 210 is sometimes referred to as a central processing unit (CPU) in the computer system 200. In some embodiments, the processor 210 and the cache memory 220 reside on the same integrated circuit (IC) substrate. Alternatively, the processor 210 and the cache memory 220 reside on different IC substrates, but are, nevertheless, incorporated into the same semiconductor package. In another alternate embodiment, the processor 210 and the cache memory 220 reside on different IC substrates and are packaged separately. In general, the processor 210 can access the cache memory 220 faster than other memory or storage devices in the computer system 200 because the cache memory 220 is designed for fast access. To shorten access time, properties of objects that have high access counts are placed in the cache memory 220 because these properties are generally likely to be accessed again by the processor 210 soon.
  • In some embodiments, the cache memory 220 has a number of cachelines 221. The size of each of the cachelines 221 may vary in different embodiments (e.g., 8-byte, 16-byte, 512-byte, etc.). Each of the cachelines 221 stores a number of properties, which may or may not be associated with the same object. For example, referring to FIG. 2, in the first one of the cachelines 221, there are property 223A, property 223B, and property 223C, where properties 223A and 223B are associated with Object1, and property 223C is associated with a different object, Object2.
  • Each property in the cache memory 220 is stored with its own access count in an access count field. For example, property access count fields 225A-225C are associated with properties 223A-223C, respectively. The size of each property may vary, such as 2-byte, 4-byte, 8-byte, etc. The number of bits in each property access count field may also vary in different embodiments. In the example illustrated in FIG. 2, the property access count fields 225A-225C are 4-bit long. The property access count fields 225A-225C may be used by access counters for the properties 223A-223C to store the corresponding access counts of the properties 223A-223C. Each time the processor 210 accesses one of the properties 223A-223C, the count in the corresponding property access count field is incremented.
  • In some embodiments, the counts in the property access count fields 225A-225C are reset to zero upon garbage collection and locality optimization. Therefore, the counts in the property access count fields 225A-225C represent the number of times the respective properties 223A-223C have been accessed by the processor 210 since the last garbage collection and locality optimization.
  • Using the number of times the respective properties 223A-223C have been accessed by the processor 210 since the last garbage collection and locality optimization, the properties 223A-223C in the cache memory 220 can be re-arranged to be contiguous so that successive accesses to the properties 223A-223C are less likely to cause contention for the same cacheline. In some embodiments, the most frequently accessed properties are identified and placed close to each other in the cache memory 220. For instance, these properties may be arranged in the same cacheline or consecutive cachelines. Note that cachelines are generally only able to hold data from a small subset of the total addressable space. For example, a 16 M cache may only have 4 or 8 cachelines able to hold data residing at addresses that are evenly divisible by 1,048,576. If the frequently accessed properties are arranged in consecutive locations, it is much less likely that successive access to two different properties will cause contention that results in the earlier accessed property to be ejected from the cache. Also, since properties are typically small compared to cachelines, arranging frequently accessed properties into consecutive address locations normally packs multiple properties into a single cacheline, so that an access to a property that causes a cache miss is likely to cause other properties that will be accessed in the near future to be loaded into the cache at the same time.
  • Note that any or all of the components of the computer system 200 and associated hardware may be used in various embodiments of the present invention. However, it can be appreciated that other configurations of the computer system 200 may include more or fewer components than those discussed above. The processor 210 and the cache memory 220 are illustrative examples of components in the computer system 200. One should appreciate that other types of components and/or devices may be included in the computer system 200 in other embodiments. For example, the processor 210 may be further coupled to an input/output controller, a memory controller, and additional memory or storage devices in the computer system 200.
  • FIG. 3 illustrates a call diagram of one embodiment of an implementation of discontiguous object addressing in a computer system. The computer system may be a server, a personal computer, a personal digital assistant, a cellular telephone, etc. One exemplary computer system usable to implement some embodiments of the current invention is shown in details in FIG. 4.
  • In some embodiments, the computer system 300 includes a method 310, a registration function 320, a memory 330, and a release function 340. When a caller (such as a user application) calls the method 310, the method 310 may attempt to reference one or more properties of an object. Thus, the method 310 calls the registration function 320 and sends a reference to the object 301, an array of property selectors 303, and a pointer to a result storage location 305 to the registration function 320. In some embodiments, the array of property selectors 303 may be statically created at compile time, and the array that holds returned data may be allocated from the stack frame of the calling method 310. The registration function 320 supplies the parameters usable by the method 310 to safely access the properties of the object that the method 310 requests to reference. Then the registration function 320 sends the references for the properties requested 325 to the memory 330 to access the properties. The memory 330 may include a cache memory, such as the cache memory 220 shown in FIG. 2. Details of how properties may be arranged and stored in the memory based on the property access counts have been discussed above with reference to FIG. 2.
  • After receiving the references for the properties requested 325, the memory 330 returns the properties 335 requested to the calling method 310. In some embodiments, the release function 340 may be called immediately before the method 310 returns to the caller, as indicated by the dashed arrows in FIG. 3.
  • If the access data is tracked separately, there may be different ways to proceed. In one embodiment, the registration function 320 populates a pointer to a property and a pointer to the corresponding property access counter for the property. In an alternate embodiment, the registration function 320 populates pointers to the properties, and initializes associated property access counters to zero, where the release function 340 and a garbage collection mechanism work together to maintain property access counts for the properties themselves. Note that the first approach may simplify the garbage collection process, but it is probably slower because updates to the property access counters would have to be synchronized. Synchronization of the property access counters may entail unnecessary cache write-throughs and bus stalls in a symmetric multi-processing (SMP) environment. As with the second alternative approach, updates to the access counter would require incrementing an integer value, which is a single cycle operation, assuming no cache misses. When the garbage collection or locality optimization thread begins, it would add and zero the values for each particular object it is managing. This may require synchronization, but some processors (such as many recent x86 microprocessors) provide atomic operations to make this simpler and faster. In this case, the release function 340 may simply add the property access counts to the respective existing property access counts for the properties.
  • FIG. 4 illustrates a diagrammatic representation of a machine in the exemplary form of a computer system 400 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed. In alternative embodiments, the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, and/or the Internet. The machine may operate in the capacity of a server or a client machine in client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
  • The exemplary computer system 400 includes a processing device 402, a main memory 404 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 406 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 418, which communicate with each other via a bus 432.
  • Processing device 402 represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device may be complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device 402 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device 402 is configured to execute the processing logic 426 for performing the operations and steps discussed herein.
  • The computer system 400 may further include a network interface device 408. The computer system 400 also may include a video display unit 410 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 412 (e.g., a keyboard), a cursor control device 414 (e.g., a mouse), and a signal generation device 416 (e.g., a speaker).
  • The data storage device 418 may include a computer-accessible storage medium 430 (also known as a computer-readable storage medium) on which is stored one or more sets of instructions (e.g., software 422) embodying any one or more of the methodologies or functions described herein. The software 422 may also reside, completely or at least partially, within the main memory 404 and/or within the processing device 402 during execution thereof by the computer system 400, the main memory 404 and the processing device 402 also constituting computer-accessible storage media. The software 422 may further be transmitted or received over a network 420 via the network interface device 408.
  • While the computer-readable storage medium 430 is shown in an exemplary embodiment to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. The term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, etc.
  • Thus, some embodiments of discontiguous object addressing have been described. It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

Claims (21)

1. A computer-implemented method comprising:
storing a plurality of objects in a memory of a computer system, said memory divided into a plurality of chunks, each of the plurality of objects having a set of one or more properties, wherein said storing comprises
storing the set of one or more properties of at least one of the plurality of objects in discontiguous chunks of the plurality of chunks of memory; and
allowing a processor of the computer system to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory.
2. The method of claim 1, further comprising:
the processor maintaining a property access count in a property access counter for each of the set of one or more properties, the property access count being indicative of a number of times a respective property has been accessed since last garbage collection; and
the processor selecting one of the discontiguous chunks to store a respective property based on the property access count.
3. The method of claim 1, further comprising:
the processor managing an object in the memory as a single unit, said object having a plurality of properties;
the processor maintaining an access count in an access counter for the object, the access count being indicative of a number of times the object has been accessed since last garbage collection; and
if the access count for the object exceeds a predetermined threshold, the processor managing the plurality of properties independently and maintaining individual property access counts in a plurality of property access counters for each of the plurality of properties.
4. The method of claim 1, wherein allowing the processor to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory comprises:
the processor receiving from a calling function a reference to one object of the plurality of objects, an array of property selectors, and a pointer to a location for storing result.
5. The method of claim 1, wherein allowing the processor to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory comprises:
the processor executing a registration function to supply parameters that a calling function uses to reference a property in the set of one or more properties.
6. The method of claim 1, further comprising:
the processor executing a registration function to populate a first pointer to each of the set of one or more properties and a second pointer to a property access counter for a respective property.
7. The method of claim 1, further comprising:
the processor executing a registration function to populate a first set of pointers to the set of one or more properties;
the processor initializing a set of property access counters associated with the set of one or more properties to zero; and
the processor maintaining access counts of the set of one or more properties in the set of property access counters using a release function and a garbage collection mechanism.
8. An apparatus comprising:
a memory to store a plurality of objects, said memory divided into a plurality of chunks, and each of the plurality of objects having a set of one or more properties, wherein the set of one or more properties of at least one of the plurality of objects are stored in discontiguous chunks of the plurality of chunks of memory; and
a processor coupled to the memory, to access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory independently.
9. The apparatus of claim 8, further comprising:
a set of one or more property access counters, each associated with a distinct one of the set of one or more properties, wherein a property access count in a respective property access counter is indicative of a number of times a respective property has been accessed by the processor since last garbage collection, wherein the processor selects one of the discontiguous chunks to store the respective property based on the property access count.
10. The apparatus of claim 8, further comprising:
an access counter for an object in the memory, said object having a plurality of properties, wherein a count in the access counter is indicative of a number of times the object has been accessed by the processor since last garbage collection; and
a plurality of property access counters, each associated with a distinct one of the plurality of properties, wherein the processor initializes the plurality of property access counters to track numbers of access of the plurality of properties individually.
11. The apparatus of claim 8, further comprising:
a second memory to host a registration function, wherein the processor executes the registration function to receive a reference to one object of the plurality of objects, an array of property selectors, and a pointer to a location for storing results for the one object.
12. The apparatus of claim 8, further comprising:
a second memory to host a registration function, wherein the processor executes the registration function to supply parameters that a calling function uses to reference a property in the set of one or more properties.
13. The apparatus of claim 8, further comprising:
a second memory to host a registration function, wherein the processor executes the registration function to populate a first pointer to each of the set of one or more properties and a second pointer to an access counter for a respective property.
14. The apparatus of claim 8, further comprising:
a second memory to host a registration function and a release function, wherein the processor executes the registration function to populate a first set of pointers to the set of one or more properties and to initialize a set of property access counters associated with the set of one or more properties to zero; wherein the processor further executes the release function in operation with a garbage collection mechanism to maintain access counts of the set of one or more properties in the set of property access counters.
15. A computer-readable storage medium embodying instructions that, when executed by a processor in a computer system, will cause the processor to perform a method comprising:
storing a plurality of objects in a memory of the computer system, said memory divided into a plurality of chunks, each of the plurality of objects having a set of one or more properties, wherein said storing comprises
storing the set of one or more properties of at least one of the plurality of objects in discontiguous chunks of the plurality of chunks of memory; and
allowing the processor of the computer system to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory.
16. The computer-readable storage medium of claim 15, wherein the method further comprises:
the processor maintaining a property access count in a property access counter for each of the set of one or more properties, the property access count being indicative of a number of times a respective property has been accessed since last garbage collection; and
the processor selecting one of the discontiguous chunks to store a respective property based on the property access count.
17. The computer-readable storage medium of claim 15, wherein the method further comprises:
the processor managing an object in the memory as a single unit, said object having a plurality of properties;
the processor maintaining an access count in an access counter for the object, the access count being indicative of a number of times the object has been accessed since last garbage collection; and
if the access count for the object exceeds a predetermined threshold, the processor managing the plurality of properties independently and maintaining individual property access counts in a plurality of property access counters for each of the plurality of properties.
18. The computer-readable storage medium of claim 15, wherein allowing the processor to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory comprises:
the processor receiving from a calling function a reference to one object of the plurality of objects, an array of property selectors, and a pointer to a location for storing result.
19. The computer-readable storage medium of claim 15, wherein allowing the processor to independently access individual properties in the set of one or more properties in the discontiguous chunks of the plurality of chunks of memory comprises:
the processor executing a registration function to supply parameters that a calling function uses to reference a property in the set of one or more properties.
20. The computer-readable storage medium of claim 15, wherein the method further comprises:
the processor executing a registration function to populate a first pointer to each of the set of one or more properties and a second pointer to a property access counter for a respective property.
21. The computer-readable storage medium of claim 15, wherein the method further comprises:
the processor executing a registration function to populate a first set of pointers to the set of one or more properties;
the processor initializing a set of property access counters associated with the set of one or more properties to zero; and
the processor maintaining access counts of the set of one or more properties in the set of property access counters using a release function and a garbage collection mechanism.
US12/393,993 2009-02-26 2009-02-26 Discontiguous object addressing Active 2032-05-10 US8489840B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/393,993 US8489840B2 (en) 2009-02-26 2009-02-26 Discontiguous object addressing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/393,993 US8489840B2 (en) 2009-02-26 2009-02-26 Discontiguous object addressing

Publications (2)

Publication Number Publication Date
US20100217947A1 true US20100217947A1 (en) 2010-08-26
US8489840B2 US8489840B2 (en) 2013-07-16

Family

ID=42631909

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/393,993 Active 2032-05-10 US8489840B2 (en) 2009-02-26 2009-02-26 Discontiguous object addressing

Country Status (1)

Country Link
US (1) US8489840B2 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087563A1 (en) * 2001-01-02 2002-07-04 Sanjay Ghemawat System and method for reorganizing data storage in accordance with usage frequency
US20040215880A1 (en) * 2003-04-25 2004-10-28 Microsoft Corporation Cache-conscious coallocation of hot data streams
US6862729B1 (en) * 2000-04-04 2005-03-01 Microsoft Corporation Profile-driven data layout optimization
US20050149346A1 (en) * 2004-01-05 2005-07-07 International Business Machines Corporation Method and apparatus for efficient implementation of discontiguous objects
US20080034355A1 (en) * 2006-06-30 2008-02-07 Xiaowei Shen Memory access monitoring
US20090199169A1 (en) * 2008-01-31 2009-08-06 Sun Microsystems, Inc. Method and system for array optimization

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6862729B1 (en) * 2000-04-04 2005-03-01 Microsoft Corporation Profile-driven data layout optimization
US20020087563A1 (en) * 2001-01-02 2002-07-04 Sanjay Ghemawat System and method for reorganizing data storage in accordance with usage frequency
US20040215880A1 (en) * 2003-04-25 2004-10-28 Microsoft Corporation Cache-conscious coallocation of hot data streams
US20050149346A1 (en) * 2004-01-05 2005-07-07 International Business Machines Corporation Method and apparatus for efficient implementation of discontiguous objects
US20080034355A1 (en) * 2006-06-30 2008-02-07 Xiaowei Shen Memory access monitoring
US20090199169A1 (en) * 2008-01-31 2009-08-06 Sun Microsystems, Inc. Method and system for array optimization

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Jesse Liberty. Sams Teach Yourself C++ in 24 Hours. Aug. 2001. Sams Publishing. 3rd ed. Pp 136-138. *
Michael Franz and Thomas Kistler. "Splitting Data Objects to Increase Cache Utilization." Oct. 1998. Department of Information and Computer Science, University of California, Irvine. TR No. 98-34. *
Robert Hundt et al. "Practical Structure Layout Optimization and Advice." March 2006. IEEE. CGO '06. *
Rodric M. Rabbah and Krishna V. Palem. "Data Remapping for Design Space Optimization of Embedded Memory Spaces." May 2003. ACM. ACM Transactions on Embedded Computing SYstems. Vol. 2. Pp 186-218. *
Sun Microsystems. Java Dynamic Management Kit 5.0 Tutorial. June 2002. Sun Microsystems. Pp 42-44. *
Xianglong Huang. "The Garbage Collection Advantage: Improving Program Locality." Oct. 2004. ACM. OOPSLA '04. Pp 69-80. *

Also Published As

Publication number Publication date
US8489840B2 (en) 2013-07-16

Similar Documents

Publication Publication Date Title
US8370575B2 (en) Optimized software cache lookup for SIMD architectures
US10176099B2 (en) Using data pattern to mark cache lines as invalid
US8725956B2 (en) Memory sharing among computer programs
US7502890B2 (en) Method and apparatus for dynamic priority-based cache replacement
US8370577B2 (en) Metaphysically addressed cache metadata
US9086989B2 (en) Extending processor MMU for shared address spaces
US8108614B2 (en) Mechanism for effectively caching streaming and non-streaming data patterns
US9886385B1 (en) Content-directed prefetch circuit with quality filtering
US9513886B2 (en) Heap data management for limited local memory(LLM) multi-core processors
CN107111548B (en) The object memories migration of hardware auxiliary
CN111353156A (en) Scalable multi-key global memory encryption engine
US10684857B2 (en) Data prefetching that stores memory addresses in a first table and responsive to the occurrence of loads corresponding to the memory addresses stores the memory addresses in a second table
US10534575B1 (en) Buffering of associative operations on random memory addresses
US8112588B2 (en) Sorting cache objects based on access counters reset upon garbage collection
US9921759B2 (en) Multithreaded memory manager to de-allocate memory objects using private freelists
US20140013054A1 (en) Storing data structures in cache
US10976961B2 (en) Device, system and method to detect an uninitialized memory read
US7502913B2 (en) Switch prefetch in a multicore computer chip
US20220269675A1 (en) Hash-based data structure
US9405690B2 (en) Method for storing modified instruction data in a shared cache
US8489840B2 (en) Discontiguous object addressing
CN111752610A (en) Performance Management Unit (PMU) assisted tier selection in heterogeneous memories
US10649786B2 (en) Reduced stack usage in a multithreaded processor
US20230205699A1 (en) Region aware delta prefetcher
US11379368B1 (en) External way allocation circuitry for processor cores

Legal Events

Date Code Title Description
AS Assignment

Owner name: RED HAT, INC., NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHNEIDER, JAMES P.;REEL/FRAME:022324/0213

Effective date: 20090226

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8